Click here to view registration types and pricing (PDF)
2016 Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 4, 2016
    7:00 am
    Registration Open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 3:00 pm
    Location / Room: Registration Desk
    7:30 am
    Executive Advisory Council Breakfast - Risk Acceptance, Prioritization & Management - VIP / Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    7:30 am - 8:30 am
    Location / Room: Courtyard 6
    8:30 am
    InfraGard Session: The Syrian Crisis and American Youth
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 9:15 am
    Location / Room: Presentation Theater
    8:00 am
    Leveraging ISO27001
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:00 am - 9:30 am
    Location / Room: Devin
    8:30 am
    Security 3.0: The Future of Information Security, From Beginning to End-Point
    • session level icon
    speaker photo
    CEO, Night Lion Security
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    8:30 am
    Trend Micro: The Internet of Things- Considerations for the Workplace
    • session level icon
    Registration Level:
    • session level iconConference Pass
    8:30 am - 9:15 am
    9:30 am
    OPENING KEYNOTE: Remote Exploitation of an Unaltered Passenger Vehicle
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:30 am - 10:15 am
    10:15 am
    Conference Break/ Exhibitor Product Demonstrations/ Infused Water Bar
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:15 am
    11:15 am
    Edgar Allan Poe: Paradox, Enigma, Genius
    • session level icon
    speaker photo
    CISSP, President, O'Leary Management Education
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    Location / Room: Wayne
    11:15 am
    Protecting Payments with PCI
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:15 am
    Radware: Cyber War Chronicles- Stories From the Virtual Trenches
    • session level icon
    speaker photo
    Security Evangelist, Radware
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 12:00 pm
    Location / Room: Courtyard 3
    11:15 am
    Security Operations Center? I Thought This Was Comic Con.
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:15 am - 12:00 pm
    11:00 am
    Wombat: The State of Phishing Attacks and How to Reduce their Impact
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 12:00 pm
    Location / Room: Presentation Theater
    12:00 pm
    Advisory Council Lunch: Security Awareness- From the Lunch Table to the Boardroom- VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Courtyard 6
    12:15 pm
    LUNCH KEYNOTE: Radware- Safety, Sanctuary and Security: The Societal Impact of Ever-Permeating Connectivity
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 12:00 pm
    1:15 pm
    Panel: After the Hack
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Courtyard 1/Keynote
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm
    Location / Room: Presentation Theater
    12:00 pm
    Executive Roundtable - Big Data Security- VIP/Invite Only
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 1:00 pm
    Location / Room: Strafford
    12:15 pm
    LUNCH KEYNOTE: Radware - Safety, Sanctuary and Security: The Societal Impact of Ever-Permeating Connectivity
    • session level icon
    speaker photo
    Director of Security, Radware
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm
    1:15 pm
    Panel: Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 am
    Location / Room: Keynote Theater
    2:15 pm
    Conference Dessert Break / Exhibitor Product Demonstrations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 3:00 pm
    2:30 pm
    Dash for Prizes & CyberHunt
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 2:45 pm
    Location / Room: SecureWorld Exhibit Floor
    3:00 pm
    Cybereason: Defense Grade Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 4:45 pm
    Location / Room: Courtyard 2
    3:00 pm
    Privacy, Data Security & Liability Developments on the Internet of Things
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Courtyard 5
    3:00 pm
    Real World Incident Response to a CryptoLocker Infection- How We Discovered it When Our AV Didn't
    • session level icon
    speaker photo
    VP of Information Security, Veterans United Home Loans
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    3:00 pm
    You Moved, But Are You Secure?
    • session level icon
    Registration Level:
    • session level iconConference Pass
    3:00 pm - 3:45 pm
    Location / Room: Courtyard 4
Exhibitors
Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Vinny Troia
    CEO, Night Lion Security

    Founder and Principal Security Consultant of Night Lion Security, Vinny Troia brings 20+ years of IT security and development experience. He is also a featured speaker on ABC, CNBC, and Fox News.

  • speaker photo
    John O'Leary
    CISSP, President, O'Leary Management Education

    John O'Leary, CISSP, is President of O'Leary Management Education. His background spans four decades as an active practitioner in information systems, IT Security and contingency planning. He has designed, implemented and managed security and recovery for networks ranging from single site to multinational. John has trained tens of thousands of practitioners, and conducted on-site programs at major corporations and government facilities worldwide. He has also facilitated meetings of Working Peer Groups, where security professionals from diverse corporations share ideas, concerns and techniques. John is the recipient of the 2004 COSAC award, the 2006 EuroSec Prix de Fidelite, and the 2011 ISC2 Lifetime Achievement Award

  • speaker photo
    Ron Winward
    Security Evangelist, Radware

    Ron Winward is a Security Evangelist for Radware, where he helps execute the company’s thought leadership on today’s security threat landscape. Ron brings nearly 20 years of experience in the Internet service provider space, most recently as Director of Network Engineering for a global infrastructure and colocation provider. With an expertise in network architectures and DDoS mitigation, Ron has helped design solutions for carriers, enterprises, and cybersecurity service providers around the world.

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Ben Desjardins
    Director of Security, Radware

    Ben Desjardins drives the development of vertical and use-case specific solutions for Radware’s Security Product Portfolio. In this role, Ben focuses extensively on the competitive landscape for anti-DDoS, Web Application Firewalls and Intrusion Prevention Systems.

    Ben has extensive experience across a wide array of security technologies and disciplines, including DDoS, DNS, SSL, Threat/Vulnerability Management, IAM and PCI-DSS and he brings nearly two decades of marketing management experience to his work at Radware, including over 12 years focused on the information security and cyber threat arenas. Additionally, Ben has led global go-to-market efforts across many industries including retail, Ecommerce, financial services, public sector and healthcare/life sciences.

  • speaker photo
    Randy Raw
    VP of Information Security, Veterans United Home Loans

    Randy Raw is Director of Information Security, serving as the Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has 25 years of experience in both public entities and private industry, having built three Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community and the Central Missouri InfraGard chapter.

secure world app
Conference App and Microsite!
Registration is easy and takes just a few minutes. Once you get started you can use your phone, tablet or internet browser to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
app store play store